www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.html proprietary-...


From: Therese Godefroy
Subject: www/proprietary malware-apple.html proprietary-...
Date: Thu, 31 Oct 2019 07:26:09 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/10/31 07:26:09

Modified files:
        proprietary    : malware-apple.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Safari spies on users for Tencent (www-discuss 2019-10-31).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.172&r2=1.173

Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- malware-apple.html  21 Oct 2019 06:53:51 -0000      1.115
+++ malware-apple.html  31 Oct 2019 11:26:06 -0000      1.116
@@ -604,6 +604,18 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201910131">
+    <p>Safari occasionally <a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service</a>, to check URLs that a rough screening has detected
+    as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
+    with the government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.</p>
+  </li>
+
   <li id="M201910130">
     <p>The Chinese Communist Party's &ldquo;Study
     the Great Nation&rdquo; app requires users to grant it <a
@@ -889,7 +901,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/21 06:53:51 $
+$Date: 2019/10/31 11:26:06 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary-surveillance.html       19 Oct 2019 09:56:22 -0000      1.303
+++ proprietary-surveillance.html       31 Oct 2019 11:26:07 -0000      1.304
@@ -494,6 +494,18 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201910131">
+    <p>Safari occasionally <a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service</a>, to check URLs that a rough screening has detected
+    as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
+    with the government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.</p>
+  </li>
+
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -2522,7 +2534,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/19 09:56:22 $
+$Date: 2019/10/31 11:26:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- proprietary.html    28 Oct 2019 06:53:10 -0000      1.186
+++ proprietary.html    31 Oct 2019 11:26:08 -0000      1.187
@@ -149,6 +149,18 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201910131">
+    <p>Safari occasionally <a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service</a>, to check URLs that a rough screening has detected
+    as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
+    with the government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.</p>
+  </li>
+
   <li id="M201904080">
     <p>Apple plans to require that <a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/";>
@@ -210,14 +222,6 @@
     <p>Obeying the &ldquo;local laws&rdquo; about what people can do with
     software is no excuse for censoring what software people can use.</p>
   </li>
-
-  <li id="M201910071">
-    <p>Adobe has <a
-    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order";>
-    cancelled the software subscriptions of all users in
-    Venezuela</a>. This demonstrates how a requirement for subscription can be
-    turned into a tool for sabotage.</p>
-  </li>
 </ul>
 
 
@@ -278,7 +282,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/28 06:53:10 $
+$Date: 2019/10/31 11:26:08 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- workshop/mal.rec    28 Oct 2019 06:53:11 -0000      1.172
+++ workshop/mal.rec    31 Oct 2019 11:26:08 -0000      1.173
@@ -25,6 +25,23 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2019-10-31
+Id: 201910131
+RT: www-discuss 2019-10-31 (Safari spies on users for Tencent)
+PubDate: 2019-10-13
+Target: proprietary-surveillance.html SpywareIniThings
+Target: malware-apple.html surveillance
+Keywords: macos ios
+Blurb: <p>Safari occasionally <a
++   
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
++   sends browsing data from Apple devices in China to the Tencent Safe
++   Browsing service</a>, to check URLs that a rough screening has detected
++   as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
++   with the government, its Safe Browsing black list most certainly
++   contains the websites of political opponents. By linking the requests
++   originating from single IP addresses, the government can identify
++   dissenters in China and Hong Kong, thus endangering their lives.</p>
+
 Id: 200803070
 PubDate: 2008-03-07
 Target: malware-apple.html jails



reply via email to

[Prev in Thread] Current Thread [Next in Thread]